{"id":"https://openalex.org/W2169374412","doi":"https://doi.org/10.1109/csf.2008.21","title":"Towards Producing Formally Checkable Security Proofs, Automatically","display_name":"Towards Producing Formally Checkable Security Proofs, Automatically","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2169374412","doi":"https://doi.org/10.1109/csf.2008.21","mag":"2169374412"},"language":"en","primary_location":{"id":"doi:10.1109/csf.2008.21","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csf.2008.21","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 21st IEEE Computer Security Foundations Symposium","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032396554","display_name":"Jean Goubault-Larrecq","orcid":"https://orcid.org/0000-0001-5879-3304"},"institutions":[{"id":"https://openalex.org/I4210104198","display_name":"Laboratoire Sp\u00e9cification et V\u00e9rification","ror":"https://ror.org/01kz1bj67","country_code":"FR","type":"facility","lineage":["https://openalex.org/I11559806","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210104198","https://openalex.org/I4210159245"]},{"id":"https://openalex.org/I11559806","display_name":"\u00c9cole Normale Sup\u00e9rieure Paris-Saclay","ror":"https://ror.org/00hx6zz33","country_code":"FR","type":"education","lineage":["https://openalex.org/I11559806","https://openalex.org/I277688954"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Jean Goubault-Larrecq","raw_affiliation_strings":["CNRS, INRIA, LSV, ENS Cachan, France","Laboratoire Sp\u00e9cification et V\u00e9rification"],"affiliations":[{"raw_affiliation_string":"CNRS, INRIA, LSV, ENS Cachan, France","institution_ids":["https://openalex.org/I11559806","https://openalex.org/I1326498283","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Laboratoire Sp\u00e9cification et V\u00e9rification","institution_ids":["https://openalex.org/I4210104198"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5032396554"],"corresponding_institution_ids":["https://openalex.org/I11559806","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210104198"],"apc_list":null,"apc_paid":null,"fwci":4.1933,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.9464781,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"224","last_page":"238"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.7895322442054749},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7793077230453491},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.7525720596313477},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.6657922267913818},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6070359349250793},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5825480818748474},{"id":"https://openalex.org/keywords/automated-theorem-proving","display_name":"Automated theorem proving","score":0.5787960290908813},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5204089879989624},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5137942433357239},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5105594396591187},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.5045138597488403},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.47965553402900696},{"id":"https://openalex.org/keywords/proof-assistant","display_name":"Proof assistant","score":0.4699523448944092},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4676506221294403},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.46013420820236206},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2575998306274414},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1564532220363617}],"concepts":[{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.7895322442054749},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7793077230453491},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.7525720596313477},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.6657922267913818},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6070359349250793},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5825480818748474},{"id":"https://openalex.org/C206880738","wikidata":"https://www.wikidata.org/wiki/Q431667","display_name":"Automated theorem proving","level":2,"score":0.5787960290908813},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5204089879989624},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5137942433357239},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5105594396591187},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.5045138597488403},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.47965553402900696},{"id":"https://openalex.org/C203265346","wikidata":"https://www.wikidata.org/wiki/Q11387554","display_name":"Proof assistant","level":3,"score":0.4699523448944092},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4676506221294403},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.46013420820236206},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2575998306274414},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1564532220363617},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/csf.2008.21","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csf.2008.21","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 21st IEEE Computer Security Foundations Symposium","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.142.580","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-15.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:hal-03196493v1","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-03196493","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2008 21st IEEE Computer Security Foundations Symposium, Jun 2008, Pittsburgh, United States. pp.224-238, &#x27E8;10.1109/CSF.2008.21&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5699999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W1480122568","https://openalex.org/W1481361501","https://openalex.org/W1488313539","https://openalex.org/W1496683511","https://openalex.org/W1508641834","https://openalex.org/W1513576223","https://openalex.org/W1521419290","https://openalex.org/W1528260059","https://openalex.org/W1552360561","https://openalex.org/W1553458439","https://openalex.org/W1562901937","https://openalex.org/W1563342424","https://openalex.org/W1575717859","https://openalex.org/W1584001157","https://openalex.org/W1585533089","https://openalex.org/W1593799327","https://openalex.org/W1661076342","https://openalex.org/W1671268155","https://openalex.org/W1766332311","https://openalex.org/W1836114257","https://openalex.org/W1973054120","https://openalex.org/W1991354622","https://openalex.org/W2000346568","https://openalex.org/W2001026998","https://openalex.org/W2007008828","https://openalex.org/W2029693536","https://openalex.org/W2034753880","https://openalex.org/W2051588031","https://openalex.org/W2058129511","https://openalex.org/W2073385346","https://openalex.org/W2076864770","https://openalex.org/W2078671172","https://openalex.org/W2084798250","https://openalex.org/W2093305078","https://openalex.org/W2100824083","https://openalex.org/W2104655005","https://openalex.org/W2104748480","https://openalex.org/W2105750191","https://openalex.org/W2114104031","https://openalex.org/W2114189125","https://openalex.org/W2115656500","https://openalex.org/W2121262961","https://openalex.org/W2131664217","https://openalex.org/W2134508058","https://openalex.org/W2140521213","https://openalex.org/W2144319444","https://openalex.org/W2146973388","https://openalex.org/W2152744480","https://openalex.org/W2154392433","https://openalex.org/W2155028581","https://openalex.org/W2165243410","https://openalex.org/W2169908972","https://openalex.org/W2170630946","https://openalex.org/W2339045958","https://openalex.org/W2722911145","https://openalex.org/W2916262976","https://openalex.org/W3003983481","https://openalex.org/W3023405642","https://openalex.org/W3105521349","https://openalex.org/W3139746733","https://openalex.org/W3173479833","https://openalex.org/W4394639621","https://openalex.org/W6636778308","https://openalex.org/W6650738206","https://openalex.org/W6673959045","https://openalex.org/W6676977177","https://openalex.org/W6677884406","https://openalex.org/W6982574321"],"related_works":["https://openalex.org/W2124145386","https://openalex.org/W2809689211","https://openalex.org/W2160478595","https://openalex.org/W3100311625","https://openalex.org/W2522499048","https://openalex.org/W4214826241","https://openalex.org/W2074713291","https://openalex.org/W1909465604","https://openalex.org/W2759683207","https://openalex.org/W2102905434"],"abstract_inverted_index":{"First-order":[0],"logic":[1],"models":[2,80],"of":[3,11,44,86,131],"security":[4,26],"for":[5],"cryptographic":[6],"protocols,":[7],"based":[8],"on":[9,128],"variants":[10],"the":[12,63,70,123],"Dolev-Yao":[13],"model,":[14],"are":[15],"now":[16],"well-established":[17],"tools.":[18],"Given":[19],"that":[20,58,134],"we":[21,73,76,106],"have":[22],"checked":[23],"a":[24,30,40,83,97,112,129],"given":[25,31],"protocol":[27],"pi":[28],"using":[29],"first-order":[32],"prover,":[33],"how":[34,75,105],"hard":[35],"is":[36,60,65,136],"it":[37,109],"to":[38,110],"extract":[39,78],"formally":[41,113],"checkable":[42,114],"proof":[43],"it,":[45],"as":[46],"required":[47],"in,":[48],"e.g.,":[49,116],"common":[50],"criteria":[51],"at":[52],"evaluation":[53],"level":[54],"7?":[55],"We":[56,94],"demonstrate":[57],"this":[59,135],"surprisingly":[61],"hard:":[62],"problem":[64],"non-recursive":[66],"in":[67,91,117,122],"general.":[68],"On":[69],"practical":[71],"side,":[72],"show":[74,104],"can":[77,107],"finite":[79],"M":[81,100],"from":[82],"set":[84],"S":[85],"clauses":[87],"representing":[88],"pi,":[89],"automatically,":[90],"two":[92],"ways.":[93],"then":[95],"define":[96],"model-checker":[98],"testing":[99],"|=":[101],"S,":[102],"and":[103],"instrument":[108],"output":[111],"proof,":[115],"Coq.":[118],"This":[119],"was":[120],"implemented":[121],"h1":[124],"tool":[125],"suite.":[126],"Experience":[127],"number":[130],"protocols":[132],"shows":[133],"practical.":[137]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
